rkeene / hunter2Links
The "hunter2" password manager is a simple script-oriented password manager.
☆15Updated 6 years ago
Alternatives and similar repositories for hunter2
Users that are interested in hunter2 are comparing it to the libraries listed below
Sorting:
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Updated 3 years ago
- A Passive SSH back-end and scanner.☆104Updated 6 months ago
- CloudFlare Worker Shell☆14Updated 5 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 3 years ago
- AXFR all the things!☆27Updated 3 months ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆88Updated last year
- Determine Who Can Log In to an SSH Server☆30Updated 6 months ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆78Updated 4 months ago
- A Passive DNS backend and collector☆33Updated 3 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆87Updated 3 years ago
- Automate "airgapped" server proxy with ssh socks proxy☆101Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆16Updated 4 months ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- OnionShare; no Flask, just redbean.☆42Updated 2 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Web on top of any protocol☆113Updated 5 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 5 years ago
- Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo☆39Updated 4 years ago
- Clone network interface from one host as a tap interface on another host☆61Updated 5 years ago
- Ansible scripts to build an attack box☆25Updated 7 years ago
- Python software that reads zone files, extract NS records, and detect cyclic dependencies☆37Updated last year
- ☆44Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Network Tools☆34Updated 2 years ago
- A simple yet beautiful phishing proxy.☆58Updated 4 years ago
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago